Proceedings of the 2017 Internet Measurement Conference 2017
DOI: 10.1145/3131365.3131367
|View full text |Cite
|
Sign up to set email alerts
|

Detection, classification, and analysis of inter-domain traffic with spoofed source IP addresses

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4

Citation Types

0
35
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 34 publications
(42 citation statements)
references
References 32 publications
0
35
0
Order By: Relevance
“…Despite the knowledge of the above-mentioned attack scenarios and the costs of the damage they may incur, it has been shown that SAV is not yet widely deployed. Lichtblau et al surveyed 84 network operators to learn whether they deploy SAV and what challenges they face [16]. The reasons for not performing packet filtering include incidentally filtering out legitimate traffic, equipment limitations, and lack of a direct economic benefit.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Despite the knowledge of the above-mentioned attack scenarios and the costs of the damage they may incur, it has been shown that SAV is not yet widely deployed. Lichtblau et al surveyed 84 network operators to learn whether they deploy SAV and what challenges they face [16]. The reasons for not performing packet filtering include incidentally filtering out legitimate traffic, equipment limitations, and lack of a direct economic benefit.…”
Section: Introductionmentioning
confidence: 99%
“…The reasons for not performing packet filtering include incidentally filtering out legitimate traffic, equipment limitations, and lack of a direct economic benefit. The last aspect assumes outbound SAV when the deployed network can become an attack source but cannot [20,15] outbound absence yes yes Traceroute loops [18] outbound absence yes yes Passive detection [16,21] outbound both no no Our method [5] inbound both yes no be attacked itself. Performing inbound SAV protects networks from, for example, the threats described above, which is beneficial from the economic perspective.…”
Section: Introductionmentioning
confidence: 99%
“…In TCP/IP networks, an end-point can send IP packets with a forged source IP address [12,13]. This is called IP address spoofing, and has been used by attackers to launch Distributed Denial of Service (DDoS) attacks.…”
Section: Introductionmentioning
confidence: 99%
“…There exist methods aimed at enumerating networks without packet filtering [1][2][3][8][9][10][11][12][13][14][15]. However, a great majority of the existing work concentrates on outbound SAV, the root of DDoS attacks [8].…”
Section: Introductionmentioning
confidence: 99%